heroui logo

Dynamic Linker Copy

Elastic Detection Rules

View Source
Summary
This detection rule identifies suspicious activities related to the copying of the Linux dynamic linker binary, which is a critical component responsible for loading shared libraries required by executables at runtime. Such activities may indicate exploitation, where attackers attempt to create backup copies of the dynamic linker to inject malicious shared object files. The rule is designed to capture process executions involving commands like 'cp' or 'rsync' used for copying the dynamic linker binary and modifying the '/etc/ld.so.preload' file. Additionally, it monitors for the creation of new files ending with the 'so' extension, which indicates a shared object likely intended for malicious purposes. This rule is crucial for detecting early signs of potential attack vectors and aims to alert security analysts to respond to possible threats promptly.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
  • File
  • Container
  • Image
ATT&CK Techniques
  • T1574
  • T1574.006
Created: 2022-07-12